Course Outline

Introduction

  • Overview of Cybersecurity concepts and definitions
  • Information security vs Cybersecurity

Security Architecture and Frameworks

  • Enterprise architecture framework
  • OSI model and definitions
  • Defense in depth
  • Information flow control
  • Isolation and segmentation
  • Logging, monitoring, and detection
  • Encryption techniques and tools

Security of Assets (Networks, Systems, Applications, and Data)

  • Identity management
  • Risk assessment
  • Vulnerability management
  • Penetration testing
  • Network security
  • Operating system security
  • Application security
  • Data security

Security Operations and Responses

  • Event vs Incident
  • Legal and regulatory compliance
  • Digital forensics
  • Incident categories
  • Business continuity and disaster recovery
  • Incident response and handling

Common Challenges with Emerging Technologies

  • Threat landscape
  • Advanced persistent threats
  • Mobile technology risks
  • Consumerization of IT (IoT, Big Data, and AI)
  • Risks of Cloud Computing

Summary and Next Steps

Requirements

  • n/a

Audience

  • IT professionals
  14 Hours
 

Testimonials

Related Courses

Certified Chief Information Security Officer (CCISO)

  35 hours

Certified Ethical Hacker

  35 hours

Standard Java Security

  14 hours

Java and Web Application Security

  21 hours

Advanced Java Security

  21 hours

Advanced Java, JEE and Web Application Security

  28 hours

C/C++ Secure Coding

  21 hours

Microsoft SDL Core

  14 hours

.NET, C# and ASP.NET Security Development

  14 hours

Certificate of Cloud Security Knowledge

  14 hours

Fundamentals of Corporate Cyber Warfare

  14 hours

Open Source Cyber Intelligence - Introduction

  7 hours

Open Source Intelligence (OSINT) Advanced

  21 hours